US9973581B2 - System and method for extended wireless access gateway service provider Wi-Fi offload - Google Patents

System and method for extended wireless access gateway service provider Wi-Fi offload Download PDF

Info

Publication number
US9973581B2
US9973581B2 US14/816,138 US201514816138A US9973581B2 US 9973581 B2 US9973581 B2 US 9973581B2 US 201514816138 A US201514816138 A US 201514816138A US 9973581 B2 US9973581 B2 US 9973581B2
Authority
US
United States
Prior art keywords
address
access gateway
ggsn
network element
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/816,138
Other versions
US20160036922A1 (en
Inventor
Marco C. Centemeri
Luis Lopez
Anand Oswal
Steve Wood
William Wan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Priority to US14/816,138 priority Critical patent/US9973581B2/en
Publication of US20160036922A1 publication Critical patent/US20160036922A1/en
Assigned to CISCO TECHNOLOGY, INC. reassignment CISCO TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CENTEMERI, MARCO C., LOPEZ, LUIS, WAN, WILLIAM, WOOD, STEVE, OSWAL, ANAND
Application granted granted Critical
Publication of US9973581B2 publication Critical patent/US9973581B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • H04W76/022
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • H04W76/021
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements

Definitions

  • This disclosure relates in general to the field of communications and, more particularly, to extended wireless access gateway service provider Wi-Fi offload.
  • Wireless communication technologies are used in connection with many applications, including satellite communications systems, portable digital assistants (PDAs), laptop computers, mobile devices (e.g., cellular telephones, user equipment), etc.
  • Wireless communication technologies are handling increasing amounts of data traffic volume, and the types of data being transported through mobile wireless networks have changed dramatically. This is in part because mobile devices are becoming more sophisticated and, further, are able to engage in more data-intensive activities such as displaying movies or playing video games.
  • Video, file-sharing, and other types of usages have been gradually displacing voice as the dominant traffic in mobile wireless networks. There is a significant challenge for mobile operator providers to maintain a relationship with subscribers when they access Wi-Fi networks.
  • FIG. 1A is a simplified block diagram of a communication system for extended wireless access gateway service provider Wi-Fi offload in accordance with one embodiment of the present disclosure
  • FIG. 1B is a simplified time diagram illustrating possible example details associated with the communication system
  • FIG. 1C is a simplified flowchart illustrating potential operations associated with the communication system
  • FIG. 2A is a simplified block diagram in accordance with another embodiment of the present disclosure.
  • FIGS. 2B-1 and 2B-2 are a simplified time diagram illustrating possible example details associated with the communication system.
  • FIG. 2C is a simplified flowchart illustrating potential operations associated with the communication system.
  • a method includes receiving a dynamic host configuration protocol (DHCP) discovery signal at a wireless network element from a customer premise equipment; requesting that a data session be established at a gateway; receiving an Internet protocol (IP) address; and communicating the IP address to the customer premise equipment.
  • DHCP dynamic host configuration protocol
  • IP Internet protocol
  • the gateway is a General packet radio service support node (GGSN) or a packet data network gateway (PDN-GW).
  • the method may include receiving the IP address and a media access control address (MAC) from the customer premise equipment.
  • the method may include binding the IP address and the MAC address; and communicating the binded IP address and MAC address to the GGSN or the PDN-GW.
  • GGSN General packet radio service support node
  • PDN-GW packet data network gateway
  • provisioning scenarios may include establishing a GTP tunnel with the GGSN or the PDN-GW.
  • Mobility of the customer premise equipment can be managed by a local mobility anchor.
  • a request for establishing the data session can be a packet data protocol context.
  • the method may also include receiving a proxy binding update from an access gateway, where the proxy binding update was sent in response to receiving the DHCP discovery signal from the customer premise equipment.
  • FIG. 1A is a simplified block diagram of a communication system 10 for extended wireless access gateway service provider Wi-Fi offload in accordance with one embodiment of the present disclosure.
  • Communication system 10 includes customer premise equipment (CPEs) 12 a - d , wireless access points (WAPs) 14 a - d , a first network 16 (e.g., an Internet Protocol (IP) backhaul network), an extended wireless access gateway (EWAG) 18 , a second network 22 (e.g., an IP packet core network or an general packet radio service network (GPRS)), a GPRS support node (GGSN) or a packet data network gateway (PDN-GW) 24 , a third network 26 (e.g., Internet), a fourth network 28 (e.g., a third generation partnership project (3GPP) network), a policy and charging rules function (PCRF) node 30 , a 3GPP authentication, authorization, and accounting (AAA) node 32 , a home location register
  • IP Internet Protocol
  • communication system 10 may be configured to achieve Wi-Fi Offload of 3G radio network without the need for specific client software.
  • a signal 38 e.g., a 3GPP interworking WLAN (IWLAN) access signal
  • a signal 40 e.g., a plain IP access signal
  • PIWLAN proxy interworking wireless local area network
  • the framework of communication system 10 can solve a significant problem for mobile operators, who seek to leverage trusted WiFi access.
  • the mobile operator can leverage existing GGSNs, where Legal Interception, charging, deep packet inspection (DPI) and value added services have been already deployed.
  • DPI deep packet inspection
  • the interworking with 3GPP GGSN can further enhance the ability to offer a complete solution for WiFi aggregation: not only for mobile operators, but also for cable operators, wireline operators, etc.
  • 3GPP specifies an intelligent wireless local area networking (IWLAN) architecture as a way to integrate Wi-Fi access as part of a 3G mobile operator network.
  • IWLAN intelligent wireless local area networking
  • One problem is that current architecture, procedures, and protocols, require the deployment and management of software application into CPEs.
  • IWLAN some mobile operators and users desire an architecture where the integration of Wi-Fi in mobile aggregation is done with a network based solution such that no specific software needs to be loaded on the CPEs.
  • a proxy IWLAN (PIWLAN) model provides a mechanism to achieve this objective in the context of a 3G mobile network.
  • Existing network based architectures are based on mobile IP and proxy mobile IP and do not envisage the GGSN or PDN-GW as the anchor point.
  • the GGSN is the wireless gateway for a third generation (3G) network while PDN-GW is the wireless gateway for a fourth generation (4G) network.
  • 4G fourth generation
  • the term ‘GGSN’ should be understood to mean a GGSN for a 3G network and a PDN-GW for a 4G network.
  • the PIWLAN is based on managed Wi-Fi access, 802.1X EAP-SIM/EAP-AKA authentication on the CPEs (e.g., CPEs 12 a - d ) and WAPs (e.g., WAPs 14 a - d ), and the introduction of a network node consolidating WAG and TTG functions into an EWAG (e.g., access module 42 ).
  • EWAG 18 can implement a Gn like a TTG or perform IWLAN client emulation (thus being aggregated by an IWLAN TTG).
  • EWAG may have direct interface to a policy server (e.g., PCRF 30 ) and can perform network breakout capabilities.
  • EWAG 18 may also function as a PMIPv6 local mobility anchor (LMA) interface via GTP over a Gi interface (i.e., an IP based interface between the GGSN and a public data network (PDN) either directly to the Internet or through a WAP gateway) to a GGSN for IP address assignment.
  • a Gi interface i.e., an IP based interface between the GGSN and a public data network (PDN) either directly to the Internet or through a WAP gateway
  • EWAG 18 may be configured with full mobility and an authentication/authorization model that allows EWAG 18 to message directly to HLR/HSS 34 .
  • Such an approach does not require a specific client and allows an easy and intuitive mechanism to have access to mobile services by using Wi-Fi as just another type of wireless access.
  • seamless integration of managed Wi-Fi into existing mobile packet core aggregation can allow for the value added services (VAS) that are available to mobile users (e.g., IMS, RCS, etc) to be available to Wi-Fi users as well.
  • VAS value added services
  • the system can allow for offering an offload mechanism for Internet data access (while keeping control of CPEs 12 a - d by offering value address services), and for the aggregation of PMIPv6 base Wi-Fi infrastructure into the 3G packet core. Further, migration to 4G packet core infrastructure via domain chaining (which already defines PMIPv6 interface via s2a) can be realized. In addition, operators can manage service, billing, and access with a common, existing mobile core infrastructure and may maintain a relationship with subscribers when they roam onto Wi-Fi networks. The system further may allow scalable offload of 3G UMTS networks.
  • communication system 10 can allow extended wireless access gateway service provider Wi-Fi offload.
  • EWAG 18 could be located in the same network that WAPs 14 a - d are deployed or can be reachable via a layer three (3) routed connectivity.
  • CPEs 12 a - d could also be aggregated into EWAG 18 by a tunneling mechanism.
  • CPEs 12 a - d can be authenticated by using 802.1X EAP.
  • EWAG 18 may act as a radius proxy for all WAPs 14 a - d that need to be aggregated.
  • EWAG 18 can store the IDs from CPEs 12 a - d received from 3GPP-AAA 32 the MSISDN, negotiated QoS, and APN.
  • EWAG 18 may resolve an issue where WAPs 14 a - d find out the GGSN IP address and send a create-packet-data-protocol-context.
  • a packet data protocol (PDP) context offers a packet data connection over which the CPE and the network can exchange IP packets. For example, GTP V 1 may be used.
  • PDP packet data protocol
  • GTP V 1 may be used.
  • GGSN 24 can answer back with a create-pdp-context response containing a CPE's IP address and DNS.
  • EWAG 18 may receive the response from GGSN 24 and then answer back with a DHCP offer including the assigned IP address, DNS, and put the IP address of EWAG 18 as the default IP address.
  • EWAG 18 may be located on same subnet as GGSN 24 ; otherwise EWAG 18 will need to maintain a map of WAPs 14 a - d to specific subnets. After the DHCP process is finalized, traffic may flow into EWAG 18 where the traffic is encapsulated into GTP-U messages and sent to GGSN 24 .
  • GTP proxy interworking can be initiated at a PMIPv6 LMA.
  • a PMIPv6 mobility access gateway may issue a proxy binding update (PBU) toward the selected LMA.
  • PBU proxy binding update
  • the LMA may initiate a GTP tunnel and issue a PDP context create request to the GGSN.
  • the GGSN can respond back with an address allocated from an access point name (APN) pool of addresses.
  • the LMA may then issue a proxy binding acknowledge (PBA) that contains the IP address from the GGSN to the binding to the local subnet CoA.
  • PBA proxy binding acknowledge
  • the MAG may use the IP address of the CPE to recognize/service the CPE on its locally attached subnet.
  • the LMA then responds to the original DHCP discovery request from the CPE with an offer of the IP address returned from the GGSN and completes the address configuration process. If the CPE moves within the PMIPv6 domain, mobility is managed by the LMA and the GGSN is not involved. The CPE is able to move from MAG to MAG without having to change its IP address.
  • EWAG 18 acts as DHCP Server for selected CPEs (e.g., those with EAP-SIM/EAP-AKA), since the IP will be served from the GGSN.
  • EWAG 18 By configuring EWAG 18 to act as a DHCP server (e.g., using access module 42 ), other types of access where the DHCP server should be located on the EWAG or external server are not limited. This will allow a mobile subscriber on a WLAN to have common service management, service characteristics, access and billing on the GGSN, with the existing UMTS mobile core infrastructure.
  • CPEs 12 a - d can be associated with clients, customers, endpoints, handheld devices, or end users wishing to initiate a communication in communication system 10 via some network.
  • the term ‘CPE’ is inclusive of devices used to initiate a communication, such as a receiver, a computer, a set-top box, an Internet radio device (IRD), a cell phone, a smart phone, a tablet, a personal digital assistant (PDA), or any other device, component, element, or object capable of initiating voice, audio, video, media, or data exchanges within communication system 10 .
  • IFD Internet radio device
  • PDA personal digital assistant
  • CPEs 12 a - d may also be inclusive of a suitable interface to the human user, such as a display, a keyboard, a touchpad, a remote control, or other terminal equipment.
  • CPEs 12 a - d may also be any device that seeks to initiate a communication on behalf of another entity or element, such as a program, a database, or any other component, device, element, or object capable of initiating an exchange within communication system 10 .
  • Data refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
  • WAPs 14 a - d are configured to connect one or more CPEs 12 a - d to a network (e.g., first network 16 ).
  • WAPs 14 a - d may resemble a network hub, relaying data between connected wireless devices (e.g., CPEs 12 a - d ) in addition to a connected wired device, most often an Ethernet hub or switch. Thus, allowing wireless devices to communicate with other wired and wireless devices.
  • First network 16 , second network 22 , third network 26 , fourth network 28 , and fifth network 36 represent a series of points or nodes of interconnected communication paths for receiving and transmitting packets of information that propagate through the architecture.
  • First network 16 , second network 22 , third network 26 , fourth network 28 , and fifth network 36 each offer a communicative interface between sources and/or hosts, and each may be any local area network (LAN), wireless local area network (WLAN), metropolitan area network (MAN), Intranet, Extranet, WAN, virtual private network (VPN), or any other appropriate architecture or system that facilitates communications in a network environment.
  • LAN local area network
  • WLAN wireless local area network
  • MAN metropolitan area network
  • Intranet Intranet
  • Extranet Extranet
  • WAN virtual private network
  • the architecture of the present disclosure may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network.
  • TCP/IP transmission control protocol/internet protocol
  • the architecture of the present disclosure may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol, where appropriate and based on particular needs.
  • UDP/IP user datagram protocol/IP
  • First network 16 , second network 22 , third network 26 , fourth network 28 , and fifth network 36 may implement a UDP/IP connection and use a TCP/IP communication language protocol in particular embodiments of the present disclosure. Further, first network 16 , second network 22 , third network 26 , fourth network 28 , and fifth network 36 may implement any other suitable communication protocol for transmitting and receiving data packets within the architecture.
  • Data refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
  • First network 16 may be a backhaul network (e.g., an Internet Protocol (IP) backhaul network) that comprises intermediate links between a core network, or backbone, of the network and the small subnetworks at the “edge” of a hierarchical network.
  • First network 16 may be configured to transmit from a remote site or network to a central or main site and may include a high-capacity line; for example, to backhaul from a wireless mesh network to the wired network by aggregating the traffic on the wireless mesh over one or more high-speed lines to a private network or the Internet.
  • IP Internet Protocol
  • Second network 22 may be a packet oriented mobile data service on a 2G and 3G cellular communication system's global system for mobile communications (GSM).
  • Third network 24 may be a GPRS core network and allow 2G, 3G and WCDMA mobile networks to transmit IP packets to external networks such as the Internet.
  • PCRF node 30 may be configured to determine policy rules in real-time in a multimedia network.
  • PCRF node 30 can operate at a network core and access subscriber databases and other specialized functions, such as charging systems, in a scalable and centralized manner.
  • PCRF node 30 is the part of the network architecture that aggregates information to and from the network, operational support systems, and other sources (such as portals) in real time, supporting the creation of rules and then automatically making policy decisions for each CPE 12 a - d active on the network.
  • 3GPP AAA node 32 may provide authentication, authorization, and accounting for CPEs 12 a - d accessing and using communication system 10 .
  • HSS/HLR 34 may provide management of a centralized subscriber database of CPEs 12 a - d accessing and using communication system 10 .
  • Fifth network 36 may include a set of telephony signaling protocols which are used to set up public switched telephone network telephone calls using various protocols (e.g., SS7 (Sigtran)).
  • SS7 SS7
  • One purpose of the SS7 protocol is to set up and tear down telephone calls, number translation, local number portability, prepaid billing mechanisms, short message service (SMS), and a variety of other market services.
  • SMS protocols are an extension of the SS7 protocol family that support the same application and call management paradigms as SS7 but uses an IP transport called stream control transmission protocol (SCTP).
  • SCTP stream control transmission protocol
  • SCTP stream control transmission protocol
  • SCTP stream control transmission protocol
  • Diameter protocol SCTP for transport and is used widely in all-IP, service-oriented IMS and LTE architectures. Within the IMS control and service planes, Diameter plays a central role in policy, charging, authentication and mobility management. Diameter applications, build upon the basic standard to enable services such as IP mobility, SIP authentication, and online charging. Diameter protocols provide a flexible, scalable IP signaling platform for broadband IP networks, complementing other signaling protocols such as SS7 and Sigtran. (e.g., SS7 (Sigtran) Diameter).
  • SS7 Sigtran
  • EWAG 18 , GGSN 24 , the local mobility anchor, and the PDN-GW are network elements that can facilitate the access activities discussed herein.
  • network element is meant to encompass any of the aforementioned elements, as well as routers, switches, cable boxes, gateways, bridges, loadbalancers, firewalls, inline service nodes, proxies, servers, processors, modules, or any other suitable device, component, element, proprietary appliance, or object operable to exchange information in a network environment.
  • These network elements may include any suitable hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
  • EWAG 18 , GGSN 24 , the local mobility anchor, and/or PDN-GW include software to achieve (or to foster) the access activities discussed herein. This could include the implementation of instances of access modules 42 . Additionally, each of these elements can have an internal structure (e.g., a processor, a memory element, etc.) to facilitate some of the operations described herein. In other embodiments, these access activities may be executed externally to these elements, or included in some other network element to achieve the intended functionality. Alternatively, EWAG 18 , GGSN 24 , the local mobility anchor, and the PDN-GW may include software (or reciprocating software) that can coordinate with other network elements in order to achieve the access activities described herein. In still other embodiments, one or several devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
  • FIG. 1B is a simplified block diagram illustrating one possible set of details associated with communication system 10 .
  • This particular configuration includes CPE 12 a , WAP 14 a , EWAG 18 , GGSN 24 , 3GPP AAA 32 , and HLR 34 .
  • CPE 12 a sends an association request to WAP 14 a .
  • Extensible authentication protocol (EAP) is used to establish a connection between CPE 12 a and WAP 14 a .
  • EAP over radius is used to establish a connection between access point 14 a and 3GPP AAA 32 and an SS7 map may be used to establish a connection between 3GPP AAA 32 and HLR 34 to authenticate CPE 12 a.
  • a dynamic host configuration protocol (DHCP) discovery message 48 is sent from CPE 12 a to WAP 14 a and WAP 14 a sends a DHCP discovery message relay 50 to EWAG 18 .
  • EWAG 18 sends a create PDP context request 52 to GGSN 24 .
  • the create PDP context request 52 is a request to obtain an IP address for CPE 12 a from GGSN 24 .
  • GGSN 24 sends a response 54 to the create PDP context request 52 to EWAG 18 .
  • EWAG 18 uses the IP address from GGSN 24 , EWAG 18 sends response 56 to DHCP discovery request 50 sent by CPE 12 a .
  • CPE 12 a sends a DHCP request 58 (including the MAC address of CPE 12 a and IP address from GGSN 24 ) to EWAG 18 .
  • EWAG 18 uses the MAC address and IP address for association binding with a GTP ID and sends an DHCP acknowledgement 60 to CPE 12 a .
  • a Wi-Fi link is created using EWAG 18 .
  • an IP session is enabled from CPE 12 a to EWAG 18 .
  • access module 42 communicates the IP session in GTP binding to GGSN 24 using a GTP tunnel.
  • GGSN 24 connects to the Internet using a Gi interface.
  • FIG. 1C is a simplified flowchart 200 illustrating example activities of extended wireless access gateway service provider Wi-Fi offload.
  • a DHCP discovery signal is sent from a CPE to an access point.
  • a DHCP discovery signal may be sent from CPE 12 a to EWAG 12 a .
  • the access point forwards the DHCP signal to an EWAG.
  • WAP 14 a may forward the DHCP signal to EWAG 18 .
  • a subscriber data session is set up at a GGSN.
  • EWAG 18 may start a subscriber data session with GGSN 24 .
  • an IP address is assigned to the CPE.
  • GGSN 24 may assign an IP address to CPE 12 a .
  • the assigned IP address is packaged into a DHCP offer and sent to the CPE.
  • EWAG 18 may package the IP address received from GGSN 24 and send the packaged IP address to CPE 12 a .
  • the CPE requests to own (be assigned) the IP address and sends the IP address and a MAC address to the EWAG.
  • CPE 12 a may request to be assigned the IP address from GGSN 24 and send the IP address and the CPE's 12 a MAC address to EWAG 18 .
  • a GTP tunnel is established with the GGSN.
  • a GTP tunnel may be established between EWAG 18 and GGSN 24 . Using the GTP tunnel, EWAG 18 may achieve Wi-Fi Offload of 3G radio network without the need for a specific client software on CPE 12 a.
  • FIG. 2A is a simplified block diagram of an example embodiment of communication system 10 , which is configured for extended wireless access gateway service provider Wi-Fi offload.
  • Communication system 10 includes CPEs 12 a - d , WAPs 14 a - d , mobile access gateways (MAGs) 64 a - c , backhaul network 62 (e.g., IPv4 or IPv6 backhaul network), EWAG 18 , second network 22 (e.g., an IP packet core network or a GPRS), GGSN 24 , third network 26 (e.g., Internet), fourth network 28 (e.g., 3GPP network), PCRF node 30 , 3GPP AAA node 32 , HSS/HLR 34 , a fifth network 36 (e.g., SS7 (Sigtran) Diameter).
  • MAGs mobile access gateways
  • EWAG 18 contains an access module 42 and LMA module 76 .
  • LMA module 76 is separate and distinct from EWAG 18 .
  • Access module 42 contains processor 44 a and memory 46 a .
  • LMA module 76 contains processor 44 b and memory 46 b.
  • EWAG 18 may support a PMIPv6 access network via GTP proxy operation.
  • the GTP proxy operation may be initiated at LMA module 76 . More specifically, upon receipt of FSOL from a specific CPE 12 a - d , a corresponding MAG 64 a - c may issue of proxy binding update (PBU) towards LAM module 76 .
  • PBU proxy binding update
  • LMA module 76 may initiate a GTP tunnel and issue a PDP context create request to the GGSN. GGSN will respond back with an IP address for the specific CPE 12 a - d , where the IP address may be allocated from an APN pool of addresses. LMA module 76 may then issue a proxy binding acknowledge (PBA) with the IP address of the specific CPE 12 a - d to the corresponding MAG 64 a - c for binding to the local subnet. MAG 64 a - c may use the IP address of the specific CPE 12 a - d to recognize/service the specific CPE 12 a - d on a locally attached subnet.
  • PBA proxy binding acknowledge
  • Access module 42 then responds to the original DHCP discovery message from CPE 12 a - d with an offer of the IP address returned from GGSN 24 and completes the address configuration process. If CPE 12 a - d moves within the PMIPv6 domain, mobility is managed by the LMA module 76 and GGSN 24 is not involved. EWAG 18 also uses access module 42 to act as a DHCP server for selected CPE 12 a - d (i.e., those with EAP-SIM/EAP-AKA), since the IP addresses will be served from GGSN 24 .
  • EWAG 18 may perform a radius proxy of EAP-SIM/EAP-AKA authentication.
  • EWAG 18 may perform a radius proxy of EAP-SIM/EAP-AKA authentication.
  • the specific CPE 12 a - d MAC address can be used to bind IMSI provided in EAP authentication with IP assigned via DHCP (possible to be leverage from AAA, on Access-Accept). Further, the MAC address of the specific CPE 12 a - d may be included into a calling-station-ID (Attr 31 ) radius attribute in the EAP authentication procedure.
  • 3GPP AAA node 32 can provide a MSISDN and an APN as part of an EAP-ACCEPT message.
  • GGSN 24 can provide an IP address for the specific CPE 12 a - d and GGSN 24 can provide the DNS for the specific CPE 12 a - d as well. In an embodiment, GGSN 24 remains as a PCEF/charging element.
  • MAG 64 a - c may be configured to use ISG for both authentication and FSOL session triggers. For example, some FSOL triggers that may be supported for EWAG 18 operations include IPv6 router solicitation message, unclassified MAC address, unclassified IP address, etc.
  • GGSN 24 is configured for traffic policy enforcement and is also the anchor point for the Wi-Fi session initiated by the specific CPE 12 a - d (e.g., all data for the specific CPE 12 a - d travels through GGSN 24 via APN point of attachment).
  • local traffic breakout e.g., bypassing GGSN data plane
  • subscriber QoS and access policy may be pushed to EWAG 18 via Radius or Diameter protocol messages. ISG can be reused for this purpose providing that Radius/AAA messages can be proxied or translated to the interface with the MPC policy infrastructure.
  • 3GPP policy interfaces can be directly exposed on EWAG 18 .
  • FIG. 2B-1 (in conjunction with FIG. 2B-2 ) is a simplified block diagram illustrating one possible set of details associated with communication system 10 .
  • This particular configuration includes CPE 12 a , access point 14 a , MAG 64 a , EWAG 18 /LMA module 76 , GGSN 24 , 3GPP AAA 32 , and HLR 34 .
  • CPE 12 a sends an association request to access point 14 a that is communicated to MAG 64 a .
  • EAP is used to establish a connection between CPE 12 a and access point MAG 64 a .
  • EAP over radius is used to establish a connection between MAG 64 a and 3GPP AAA 32 and an SS7 map may be used to establish a connection between 3GPP AAA 32 and HLR 34 to validate CPE 12 a.
  • a DHCP discovery message 50 is sent from CPE 12 a to MAG 64 a and MAG 64 a sends a proxy binding update 68 to EWAG 18 .
  • EWAG 18 sends a create PDP context request 70 to GGSN 24 .
  • the create PDP context request 70 is a request to obtain an IP address for CPE 12 a from GGSN 24 and authenticate CPE 12 a.
  • FIG. 2B-2 (in conjunction with FIG. 2B-1 ) is a simplified block diagram illustrating one possible set of details associated with communication system 10 .
  • GGSN 24 sends a response 72 to the create PDP context request 70 to EWAG 18 /LMA module 76 .
  • EWAG 18 /LMA module 76 uses the IP address from GGSN 24 to send response 74 to DHCP discovery request 50 sent by CPE 12 a .
  • CPE 12 a sends a DHCP request 58 (including the MAC address of CPE 12 a and IP address from GGSN 24 ) to EWAG 18 /LMA module 76 .
  • EWAG 18 /LMA module 76 uses the MAC address and IP address for association binding with a GTP ID and sends an DHCP acknowledgement 60 to CPE 12 a . As a result, a Wi-Fi link is created using EWAG 18 . More specifically, an IP session is enabled from CPE 12 a to EWAG 18 . At EWAG 18 , access module 42 communicates the IP session in GTP binding to GGSN 24 using a GTP tunnel. GGSN 24 connects to the Internet using a Gi interface.
  • FIG. 2C is a simplified flowchart 300 illustrating example activities of EWAG service provider Wi-Fi offload.
  • a DHCP discovery signal is sent from a CPE to a MAG.
  • a DHCP discovery signal may be sent from CPE 12 a to MAG 64 a .
  • a proxy binding update is sent from the MAG to a LMA.
  • MAG 64 a may send a proxy binding update to LMA module 76 .
  • a subscriber data session is set up at a GGSN.
  • EWAG 18 may start a subscriber data session with GGSN 24 .
  • an IP address is assigned to the CPE.
  • GGSN 24 may assign an IP address to CPE 12 a .
  • the assigned IP address is packaged into a DHCP offer and sent to the CPE.
  • EWAG 18 may package the IP address received from GGSN 24 and send the packaged IP address to CPE 12 a .
  • the CPE requests to own (be assigned) the IP address and sends the IP address and a MAC address to the EWAG.
  • CPE 12 a may request to be assigned the IP address from GGSN 24 and send the IP address and the CPE's 12 a MAC address to EWAG 18 .
  • a GTP tunnel is established with the GGSN.
  • a GTP tunnel may be established between EWAG 18 and GGSN 24 . Using the GTP tunnel, EWAG 18 may achieve Wi-Fi offload of 3G radio network without the need for a specific client software on CPE 12 a.
  • a network element can include software to achieve the access management operations, as outlined herein in this document.
  • the access management functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor [processor 44 a shown in FIGS. 1A and 2A and processor 44 b shown in FIG. 2A ], or other similar machine, etc.).
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • the 2A can store data used for the operations described herein. This includes the memory element being able to store software, logic, code, or processor instructions that are executed to carry out the activities described in this Specification.
  • the processor e.g., processor 44 a and 44 b
  • the processor can execute any type of instructions associated with the data to achieve the operations detailed herein in this Specification.
  • the processor could transform an element or an article (e.g., data) from one state or thing to another state or thing.
  • the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by the processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array [FPGA], an erasable programmable read only memory (EPROM), an electrically erasable programmable ROM (EEPROM)) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof.
  • FPGA field programmable gate array
  • EPROM erasable programmable read only memory
  • EEPROM electrically erasable programmable ROM
  • any of these elements can include memory elements for storing information to be used in achieving the access activities as outlined herein.
  • each of these devices may include a processor that can execute software or an algorithm to perform the access management activities as discussed in this Specification.
  • These devices may further keep information in any suitable memory element [random access memory (RAM), ROM, EPROM, EEPROM, ASIC, etc.], software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs.
  • RAM random access memory
  • ROM read only memory
  • EPROM Erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • ASIC application specific integrated circuitry
  • any of the memory items discussed herein should be construed as being encompassed within the broad term ‘memory element.’
  • any of the potential processing elements, modules, and machines described in this Specification should be construed as being encompassed within the broad term ‘processor.’
  • Each of the network elements can also include suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment.
  • communication system 10 (and its teachings) are readily scalable and, further, can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of communication system 10 , as potentially applied to a myriad of other architectures.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method is provided in one example embodiment and includes receiving a dynamic host configuration protocol (DHCP) discovery signal at a wireless network element from a customer premise equipment; requesting that a data session be established at a gateway; receiving an Internet protocol (IP) address; and communicating the IP address to the customer premise equipment.

Description

RELATED APPLICATION
This application is a continuation (and claims the benefit of priority under 35 U.S.C. § 120) of U.S. application Ser. No. 13/305,010, filed Nov. 28, 2011, entitled “SYSTEM AND METHOD FOR EXTENDED WIRELESS ACCESS GATEWAY SERVICE PROVIDER WI-FI OFFLOAD,” Inventors Marco C. Centemeri, et al. The disclosure of the prior application is considered part of (and is incorporated in its entirety by reference in) the disclosure of this application.
TECHNICAL FIELD
This disclosure relates in general to the field of communications and, more particularly, to extended wireless access gateway service provider Wi-Fi offload.
BACKGROUND
Networking architectures have grown increasingly complex in communications environments, particularly mobile wireless environments. Wireless communication technologies are used in connection with many applications, including satellite communications systems, portable digital assistants (PDAs), laptop computers, mobile devices (e.g., cellular telephones, user equipment), etc. Wireless communication technologies are handling increasing amounts of data traffic volume, and the types of data being transported through mobile wireless networks have changed dramatically. This is in part because mobile devices are becoming more sophisticated and, further, are able to engage in more data-intensive activities such as displaying movies or playing video games. Video, file-sharing, and other types of usages (more traditionally associated with wired networks) have been gradually displacing voice as the dominant traffic in mobile wireless networks. There is a significant challenge for mobile operator providers to maintain a relationship with subscribers when they access Wi-Fi networks.
BRIEF DESCRIPTION OF THE DRAWINGS
To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:
FIG. 1A is a simplified block diagram of a communication system for extended wireless access gateway service provider Wi-Fi offload in accordance with one embodiment of the present disclosure;
FIG. 1B is a simplified time diagram illustrating possible example details associated with the communication system;
FIG. 1C is a simplified flowchart illustrating potential operations associated with the communication system;
FIG. 2A is a simplified block diagram in accordance with another embodiment of the present disclosure;
FIGS. 2B-1 and 2B-2 are a simplified time diagram illustrating possible example details associated with the communication system; and
FIG. 2C is a simplified flowchart illustrating potential operations associated with the communication system.
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
Overview
A method is provided in one example embodiment and includes receiving a dynamic host configuration protocol (DHCP) discovery signal at a wireless network element from a customer premise equipment; requesting that a data session be established at a gateway; receiving an Internet protocol (IP) address; and communicating the IP address to the customer premise equipment.
In more specific embodiments, the gateway is a General packet radio service support node (GGSN) or a packet data network gateway (PDN-GW). In other implementations, the method may include receiving the IP address and a media access control address (MAC) from the customer premise equipment. In other instances, the method may include binding the IP address and the MAC address; and communicating the binded IP address and MAC address to the GGSN or the PDN-GW.
Other example provisioning scenarios may include establishing a GTP tunnel with the GGSN or the PDN-GW. Mobility of the customer premise equipment can be managed by a local mobility anchor. In addition, a request for establishing the data session can be a packet data protocol context. The method may also include receiving a proxy binding update from an access gateway, where the proxy binding update was sent in response to receiving the DHCP discovery signal from the customer premise equipment.
Example Embodiments
Turning to FIG. 1A, FIG. 1A is a simplified block diagram of a communication system 10 for extended wireless access gateway service provider Wi-Fi offload in accordance with one embodiment of the present disclosure. Communication system 10 includes customer premise equipment (CPEs) 12 a-d, wireless access points (WAPs) 14 a-d, a first network 16 (e.g., an Internet Protocol (IP) backhaul network), an extended wireless access gateway (EWAG) 18, a second network 22 (e.g., an IP packet core network or an general packet radio service network (GPRS)), a GPRS support node (GGSN) or a packet data network gateway (PDN-GW) 24, a third network 26 (e.g., Internet), a fourth network 28 (e.g., a third generation partnership project (3GPP) network), a policy and charging rules function (PCRF) node 30, a 3GPP authentication, authorization, and accounting (AAA) node 32, a home location register/home subscriber server (HSS/HLR) 34, a fifth network 36 (e.g., signaling system seven (SS7) (Sigtran), Diameter). EWAG 18 contains an access module 42. Access module 42 contains a processor 44 a and a memory 46 a.
In one particular instance, communication system 10 may be configured to achieve Wi-Fi Offload of 3G radio network without the need for specific client software. For example, a signal 38 (e.g., a 3GPP interworking WLAN (IWLAN) access signal) and a signal 40 (e.g., a plain IP access signal) may be generated in the network. Certain embodiments of the present disclosure offer a proxy interworking wireless local area network (PIWLAN) model, which defines an innovative solution for various groups (e.g., mobile operators). The can provide a solution to leverage trusted WiFi access to achieve WiFi offload of 3G radio networks without the need for a specific client software.
The framework of communication system 10 can solve a significant problem for mobile operators, who seek to leverage trusted WiFi access. For example, with PIWLAN, the mobile operator can leverage existing GGSNs, where Legal Interception, charging, deep packet inspection (DPI) and value added services have been already deployed. Furthermore, there is no need for a specific client to be installed on the user equipment and, as such, the solution would engender a mass deployment. The interworking with 3GPP GGSN can further enhance the ability to offer a complete solution for WiFi aggregation: not only for mobile operators, but also for cable operators, wireline operators, etc.
For purposes of illustrating certain example techniques of communication system 10, it is important to understand the communications that may be traversing the network. The following foundational information may be viewed as a basis from which the present disclosure may be properly explained. 3GPP specifies an intelligent wireless local area networking (IWLAN) architecture as a way to integrate Wi-Fi access as part of a 3G mobile operator network. One problem is that current architecture, procedures, and protocols, require the deployment and management of software application into CPEs. In IWLAN, some mobile operators and users desire an architecture where the integration of Wi-Fi in mobile aggregation is done with a network based solution such that no specific software needs to be loaded on the CPEs.
A proxy IWLAN (PIWLAN) model provides a mechanism to achieve this objective in the context of a 3G mobile network. Existing network based architectures are based on mobile IP and proxy mobile IP and do not envisage the GGSN or PDN-GW as the anchor point. The GGSN is the wireless gateway for a third generation (3G) network while PDN-GW is the wireless gateway for a fourth generation (4G) network. As used herein in this Specification, the term ‘GGSN’ should be understood to mean a GGSN for a 3G network and a PDN-GW for a 4G network.
The PIWLAN is based on managed Wi-Fi access, 802.1X EAP-SIM/EAP-AKA authentication on the CPEs (e.g., CPEs 12 a-d) and WAPs (e.g., WAPs 14 a-d), and the introduction of a network node consolidating WAG and TTG functions into an EWAG (e.g., access module 42). Using access module 42, EWAG 18 can implement a Gn like a TTG or perform IWLAN client emulation (thus being aggregated by an IWLAN TTG). In addition, EWAG may have direct interface to a policy server (e.g., PCRF 30) and can perform network breakout capabilities. In an embodiment, EWAG 18 may also function as a PMIPv6 local mobility anchor (LMA) interface via GTP over a Gi interface (i.e., an IP based interface between the GGSN and a public data network (PDN) either directly to the Internet or through a WAP gateway) to a GGSN for IP address assignment.
EWAG 18 may be configured with full mobility and an authentication/authorization model that allows EWAG 18 to message directly to HLR/HSS 34. Such an approach does not require a specific client and allows an easy and intuitive mechanism to have access to mobile services by using Wi-Fi as just another type of wireless access. In addition, seamless integration of managed Wi-Fi into existing mobile packet core aggregation can allow for the value added services (VAS) that are available to mobile users (e.g., IMS, RCS, etc) to be available to Wi-Fi users as well.
Further, reusing for Wi-Fi users current charging, LI and provisioning defined for mobile users may be offered. Also, the system can allow for offering an offload mechanism for Internet data access (while keeping control of CPEs 12 a-d by offering value address services), and for the aggregation of PMIPv6 base Wi-Fi infrastructure into the 3G packet core. Further, migration to 4G packet core infrastructure via domain chaining (which already defines PMIPv6 interface via s2a) can be realized. In addition, operators can manage service, billing, and access with a common, existing mobile core infrastructure and may maintain a relationship with subscribers when they roam onto Wi-Fi networks. The system further may allow scalable offload of 3G UMTS networks.
In accordance with one example implementation, communication system 10 can allow extended wireless access gateway service provider Wi-Fi offload. In operation, EWAG 18 could be located in the same network that WAPs 14 a-d are deployed or can be reachable via a layer three (3) routed connectivity. CPEs 12 a-d could also be aggregated into EWAG 18 by a tunneling mechanism. In an embodiment, CPEs 12 a-d can be authenticated by using 802.1X EAP. During the EAP authentication phase, EWAG 18 may act as a radius proxy for all WAPs 14 a-d that need to be aggregated. EWAG 18 can store the IDs from CPEs 12 a-d received from 3GPP-AAA 32 the MSISDN, negotiated QoS, and APN.
With this information, EWAG 18 may resolve an issue where WAPs 14 a-d find out the GGSN IP address and send a create-packet-data-protocol-context. A packet data protocol (PDP) context offers a packet data connection over which the CPE and the network can exchange IP packets. For example, GTP V1 may be used. If authentication was successful, GGSN 24 can answer back with a create-pdp-context response containing a CPE's IP address and DNS. At a certain stage EWAG 18 may receive the response from GGSN 24 and then answer back with a DHCP offer including the assigned IP address, DNS, and put the IP address of EWAG 18 as the default IP address. EWAG 18 may be located on same subnet as GGSN 24; otherwise EWAG 18 will need to maintain a map of WAPs 14 a-d to specific subnets. After the DHCP process is finalized, traffic may flow into EWAG 18 where the traffic is encapsulated into GTP-U messages and sent to GGSN 24.
In an embodiment, GTP proxy interworking can be initiated at a PMIPv6 LMA. For example, upon receipt of first sign of life (FSOL) from a CPE a PMIPv6 mobility access gateway (MAG) may issue a proxy binding update (PBU) toward the selected LMA. When the LMA receives the PBU, it may initiate a GTP tunnel and issue a PDP context create request to the GGSN. The GGSN can respond back with an address allocated from an access point name (APN) pool of addresses. The LMA may then issue a proxy binding acknowledge (PBA) that contains the IP address from the GGSN to the binding to the local subnet CoA. The MAG may use the IP address of the CPE to recognize/service the CPE on its locally attached subnet. The LMA then responds to the original DHCP discovery request from the CPE with an offer of the IP address returned from the GGSN and completes the address configuration process. If the CPE moves within the PMIPv6 domain, mobility is managed by the LMA and the GGSN is not involved. The CPE is able to move from MAG to MAG without having to change its IP address.
EWAG 18 acts as DHCP Server for selected CPEs (e.g., those with EAP-SIM/EAP-AKA), since the IP will be served from the GGSN. By configuring EWAG 18 to act as a DHCP server (e.g., using access module 42), other types of access where the DHCP server should be located on the EWAG or external server are not limited. This will allow a mobile subscriber on a WLAN to have common service management, service characteristics, access and billing on the GGSN, with the existing UMTS mobile core infrastructure.
In terms of the infrastructure of the present disclosure, CPEs 12 a-d can be associated with clients, customers, endpoints, handheld devices, or end users wishing to initiate a communication in communication system 10 via some network. The term ‘CPE’ is inclusive of devices used to initiate a communication, such as a receiver, a computer, a set-top box, an Internet radio device (IRD), a cell phone, a smart phone, a tablet, a personal digital assistant (PDA), or any other device, component, element, or object capable of initiating voice, audio, video, media, or data exchanges within communication system 10. CPEs 12 a-d may also be inclusive of a suitable interface to the human user, such as a display, a keyboard, a touchpad, a remote control, or other terminal equipment. CPEs 12 a-d may also be any device that seeks to initiate a communication on behalf of another entity or element, such as a program, a database, or any other component, device, element, or object capable of initiating an exchange within communication system 10. Data, as used herein in this document, refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
WAPs 14 a-d are configured to connect one or more CPEs 12 a-d to a network (e.g., first network 16). WAPs 14 a-d may resemble a network hub, relaying data between connected wireless devices (e.g., CPEs 12 a-d) in addition to a connected wired device, most often an Ethernet hub or switch. Thus, allowing wireless devices to communicate with other wired and wireless devices.
First network 16, second network 22, third network 26, fourth network 28, and fifth network 36 represent a series of points or nodes of interconnected communication paths for receiving and transmitting packets of information that propagate through the architecture. First network 16, second network 22, third network 26, fourth network 28, and fifth network 36 each offer a communicative interface between sources and/or hosts, and each may be any local area network (LAN), wireless local area network (WLAN), metropolitan area network (MAN), Intranet, Extranet, WAN, virtual private network (VPN), or any other appropriate architecture or system that facilitates communications in a network environment. The architecture of the present disclosure may include a configuration capable of transmission control protocol/internet protocol (TCP/IP) communications for the transmission and/or reception of packets in a network. The architecture of the present disclosure may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol, where appropriate and based on particular needs.
First network 16, second network 22, third network 26, fourth network 28, and fifth network 36 may implement a UDP/IP connection and use a TCP/IP communication language protocol in particular embodiments of the present disclosure. Further, first network 16, second network 22, third network 26, fourth network 28, and fifth network 36 may implement any other suitable communication protocol for transmitting and receiving data packets within the architecture. Data, as used herein in this document, refers to any type of numeric, voice, video, media, or script data, or any type of source or object code, or any other suitable information in any appropriate format that may be communicated from one point to another.
First network 16 may be a backhaul network (e.g., an Internet Protocol (IP) backhaul network) that comprises intermediate links between a core network, or backbone, of the network and the small subnetworks at the “edge” of a hierarchical network. First network 16 may be configured to transmit from a remote site or network to a central or main site and may include a high-capacity line; for example, to backhaul from a wireless mesh network to the wired network by aggregating the traffic on the wireless mesh over one or more high-speed lines to a private network or the Internet.
Second network 22 (e.g., an IP packet core network or an general packet radio service network (GPRS)) may be a packet oriented mobile data service on a 2G and 3G cellular communication system's global system for mobile communications (GSM). Third network 24 may be a GPRS core network and allow 2G, 3G and WCDMA mobile networks to transmit IP packets to external networks such as the Internet.
PCRF node 30 may be configured to determine policy rules in real-time in a multimedia network. PCRF node 30 can operate at a network core and access subscriber databases and other specialized functions, such as charging systems, in a scalable and centralized manner. PCRF node 30 is the part of the network architecture that aggregates information to and from the network, operational support systems, and other sources (such as portals) in real time, supporting the creation of rules and then automatically making policy decisions for each CPE 12 a-d active on the network. 3GPP AAA node 32 may provide authentication, authorization, and accounting for CPEs 12 a-d accessing and using communication system 10. HSS/HLR 34 may provide management of a centralized subscriber database of CPEs 12 a-d accessing and using communication system 10.
Fifth network 36 may include a set of telephony signaling protocols which are used to set up public switched telephone network telephone calls using various protocols (e.g., SS7 (Sigtran)). One purpose of the SS7 protocol is to set up and tear down telephone calls, number translation, local number portability, prepaid billing mechanisms, short message service (SMS), and a variety of other market services. Sigtran protocols are an extension of the SS7 protocol family that support the same application and call management paradigms as SS7 but uses an IP transport called stream control transmission protocol (SCTP). For example, one protocol defined by the Sigtran group is SCTP, which is used to carry PSTN signaling over IP.
Diameter protocol SCTP for transport and is used widely in all-IP, service-oriented IMS and LTE architectures. Within the IMS control and service planes, Diameter plays a central role in policy, charging, authentication and mobility management. Diameter applications, build upon the basic standard to enable services such as IP mobility, SIP authentication, and online charging. Diameter protocols provide a flexible, scalable IP signaling platform for broadband IP networks, complementing other signaling protocols such as SS7 and Sigtran. (e.g., SS7 (Sigtran) Diameter).
EWAG 18, GGSN 24, the local mobility anchor, and the PDN-GW are network elements that can facilitate the access activities discussed herein. As used herein in this Specification, the term ‘network element’ is meant to encompass any of the aforementioned elements, as well as routers, switches, cable boxes, gateways, bridges, loadbalancers, firewalls, inline service nodes, proxies, servers, processors, modules, or any other suitable device, component, element, proprietary appliance, or object operable to exchange information in a network environment. These network elements may include any suitable hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
In one implementation, EWAG 18, GGSN 24, the local mobility anchor, and/or PDN-GW include software to achieve (or to foster) the access activities discussed herein. This could include the implementation of instances of access modules 42. Additionally, each of these elements can have an internal structure (e.g., a processor, a memory element, etc.) to facilitate some of the operations described herein. In other embodiments, these access activities may be executed externally to these elements, or included in some other network element to achieve the intended functionality. Alternatively, EWAG 18, GGSN 24, the local mobility anchor, and the PDN-GW may include software (or reciprocating software) that can coordinate with other network elements in order to achieve the access activities described herein. In still other embodiments, one or several devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
Turning to FIG. 1B, FIG. 1B is a simplified block diagram illustrating one possible set of details associated with communication system 10. This particular configuration includes CPE 12 a, WAP 14 a, EWAG 18, GGSN 24, 3GPP AAA 32, and HLR 34. In operational terms, CPE 12 a sends an association request to WAP 14 a. Extensible authentication protocol (EAP) is used to establish a connection between CPE 12 a and WAP 14 a. Also, EAP over radius is used to establish a connection between access point 14 a and 3GPP AAA 32 and an SS7 map may be used to establish a connection between 3GPP AAA 32 and HLR 34 to authenticate CPE 12 a.
A dynamic host configuration protocol (DHCP) discovery message 48 is sent from CPE 12 a to WAP 14 a and WAP 14 a sends a DHCP discovery message relay 50 to EWAG 18. In response to the DHCP discovery message relay 50, EWAG 18 sends a create PDP context request 52 to GGSN 24. The create PDP context request 52 is a request to obtain an IP address for CPE 12 a from GGSN 24. GGSN 24 sends a response 54 to the create PDP context request 52 to EWAG 18. Using the IP address from GGSN 24, EWAG 18 sends response 56 to DHCP discovery request 50 sent by CPE 12 a. CPE 12 a sends a DHCP request 58 (including the MAC address of CPE 12 a and IP address from GGSN 24) to EWAG 18. EWAG 18 uses the MAC address and IP address for association binding with a GTP ID and sends an DHCP acknowledgement 60 to CPE 12 a. As a result, a Wi-Fi link is created using EWAG 18. More specifically, an IP session is enabled from CPE 12 a to EWAG 18. At EWAG 18, access module 42 communicates the IP session in GTP binding to GGSN 24 using a GTP tunnel. GGSN 24 connects to the Internet using a Gi interface.
Turning to FIG. 1C, FIG. 1C is a simplified flowchart 200 illustrating example activities of extended wireless access gateway service provider Wi-Fi offload. At 202, a DHCP discovery signal is sent from a CPE to an access point. For example, a DHCP discovery signal may be sent from CPE 12 a to EWAG 12 a. At 204, the access point forwards the DHCP signal to an EWAG. For example, WAP 14 a may forward the DHCP signal to EWAG 18. At 206, a subscriber data session is set up at a GGSN. For example, EWAG 18 may start a subscriber data session with GGSN 24.
At 208, an IP address is assigned to the CPE. For example, GGSN 24 may assign an IP address to CPE 12 a. At 210, the assigned IP address is packaged into a DHCP offer and sent to the CPE. For example, EWAG 18 may package the IP address received from GGSN 24 and send the packaged IP address to CPE 12 a. At 212, the CPE requests to own (be assigned) the IP address and sends the IP address and a MAC address to the EWAG. For example, CPE 12 a may request to be assigned the IP address from GGSN 24 and send the IP address and the CPE's 12 a MAC address to EWAG 18. At 214, a GTP tunnel is established with the GGSN. For example, a GTP tunnel may be established between EWAG 18 and GGSN 24. Using the GTP tunnel, EWAG 18 may achieve Wi-Fi Offload of 3G radio network without the need for a specific client software on CPE 12 a.
Turning to FIG. 2A, FIG. 2A is a simplified block diagram of an example embodiment of communication system 10, which is configured for extended wireless access gateway service provider Wi-Fi offload. Communication system 10 includes CPEs 12 a-d, WAPs 14 a-d, mobile access gateways (MAGs) 64 a-c, backhaul network 62 (e.g., IPv4 or IPv6 backhaul network), EWAG 18, second network 22 (e.g., an IP packet core network or a GPRS), GGSN 24, third network 26 (e.g., Internet), fourth network 28 (e.g., 3GPP network), PCRF node 30, 3GPP AAA node 32, HSS/HLR 34, a fifth network 36 (e.g., SS7 (Sigtran) Diameter). EWAG 18 contains an access module 42 and LMA module 76. In an embodiment, LMA module 76 is separate and distinct from EWAG 18. Access module 42 contains processor 44 a and memory 46 a. LMA module 76 contains processor 44 b and memory 46 b.
Using access module 42, EWAG 18 may support a PMIPv6 access network via GTP proxy operation. The GTP proxy operation may be initiated at LMA module 76. More specifically, upon receipt of FSOL from a specific CPE 12 a-d, a corresponding MAG 64 a-c may issue of proxy binding update (PBU) towards LAM module 76.
When LMA module 76 receives the PBU, LMA module 76 may initiate a GTP tunnel and issue a PDP context create request to the GGSN. GGSN will respond back with an IP address for the specific CPE 12 a-d, where the IP address may be allocated from an APN pool of addresses. LMA module 76 may then issue a proxy binding acknowledge (PBA) with the IP address of the specific CPE 12 a-d to the corresponding MAG 64 a-c for binding to the local subnet. MAG 64 a-c may use the IP address of the specific CPE 12 a-d to recognize/service the specific CPE 12 a-d on a locally attached subnet.
Access module 42 then responds to the original DHCP discovery message from CPE 12 a-d with an offer of the IP address returned from GGSN 24 and completes the address configuration process. If CPE 12 a-d moves within the PMIPv6 domain, mobility is managed by the LMA module 76 and GGSN 24 is not involved. EWAG 18 also uses access module 42 to act as a DHCP server for selected CPE 12 a-d (i.e., those with EAP-SIM/EAP-AKA), since the IP addresses will be served from GGSN 24.
In an embodiment, configuring a GTP tunnel from EWAG 18 to GGSN 24, certain information is needed. For example, EWAG 18 may perform a radius proxy of EAP-SIM/EAP-AKA authentication. In another example, the specific CPE 12 a-d MAC address can be used to bind IMSI provided in EAP authentication with IP assigned via DHCP (possible to be leverage from AAA, on Access-Accept). Further, the MAC address of the specific CPE 12 a-d may be included into a calling-station-ID (Attr 31) radius attribute in the EAP authentication procedure. 3GPP AAA node 32 can provide a MSISDN and an APN as part of an EAP-ACCEPT message. In addition, GGSN 24 can provide an IP address for the specific CPE 12 a-d and GGSN 24 can provide the DNS for the specific CPE 12 a-d as well. In an embodiment, GGSN 24 remains as a PCEF/charging element. MAG 64 a-c may be configured to use ISG for both authentication and FSOL session triggers. For example, some FSOL triggers that may be supported for EWAG 18 operations include IPv6 router solicitation message, unclassified MAC address, unclassified IP address, etc.
GGSN 24 is configured for traffic policy enforcement and is also the anchor point for the Wi-Fi session initiated by the specific CPE 12 a-d (e.g., all data for the specific CPE 12 a-d travels through GGSN 24 via APN point of attachment). If local traffic breakout is required (e.g., bypassing GGSN data plane), then subscriber QoS and access policy may be pushed to EWAG 18 via Radius or Diameter protocol messages. ISG can be reused for this purpose providing that Radius/AAA messages can be proxied or translated to the interface with the MPC policy infrastructure. Alternatively, 3GPP policy interfaces can be directly exposed on EWAG 18.
Turning to FIG. 2B-1, FIG. 2B-1 (in conjunction with FIG. 2B-2) is a simplified block diagram illustrating one possible set of details associated with communication system 10. This particular configuration includes CPE 12 a, access point 14 a, MAG 64 a, EWAG 18/LMA module 76, GGSN 24, 3GPP AAA 32, and HLR 34. In operational terms, CPE 12 a sends an association request to access point 14 a that is communicated to MAG 64 a. EAP is used to establish a connection between CPE 12 a and access point MAG 64 a. Also, EAP over radius is used to establish a connection between MAG 64 a and 3GPP AAA 32 and an SS7 map may be used to establish a connection between 3GPP AAA 32 and HLR 34 to validate CPE 12 a.
A DHCP discovery message 50 is sent from CPE 12 a to MAG 64 a and MAG 64 a sends a proxy binding update 68 to EWAG 18. In response to the proxy binding update 68, EWAG 18 sends a create PDP context request 70 to GGSN 24. The create PDP context request 70 is a request to obtain an IP address for CPE 12 a from GGSN 24 and authenticate CPE 12 a.
Turning to FIG. 2B-2, FIG. 2B-2 (in conjunction with FIG. 2B-1) is a simplified block diagram illustrating one possible set of details associated with communication system 10. GGSN 24 sends a response 72 to the create PDP context request 70 to EWAG 18/LMA module 76. Using the IP address from GGSN 24, EWAG 18/LMA module 76 sends response 74 to DHCP discovery request 50 sent by CPE 12 a. CPE 12 a sends a DHCP request 58 (including the MAC address of CPE 12 a and IP address from GGSN 24) to EWAG 18/LMA module 76. EWAG 18/LMA module 76 uses the MAC address and IP address for association binding with a GTP ID and sends an DHCP acknowledgement 60 to CPE 12 a. As a result, a Wi-Fi link is created using EWAG 18. More specifically, an IP session is enabled from CPE 12 a to EWAG 18. At EWAG 18, access module 42 communicates the IP session in GTP binding to GGSN 24 using a GTP tunnel. GGSN 24 connects to the Internet using a Gi interface.
Turning to FIG. 2C, FIG. 2C is a simplified flowchart 300 illustrating example activities of EWAG service provider Wi-Fi offload. At 302, a DHCP discovery signal is sent from a CPE to a MAG. For example, a DHCP discovery signal may be sent from CPE 12 a to MAG 64 a. At 304, a proxy binding update is sent from the MAG to a LMA. For example, MAG 64 a may send a proxy binding update to LMA module 76. At 306, a subscriber data session is set up at a GGSN. For example, EWAG 18 may start a subscriber data session with GGSN 24.
At 308, an IP address is assigned to the CPE. For example, GGSN 24 may assign an IP address to CPE 12 a. At 310, the assigned IP address is packaged into a DHCP offer and sent to the CPE. For example, EWAG 18 may package the IP address received from GGSN 24 and send the packaged IP address to CPE 12 a. At 312, the CPE requests to own (be assigned) the IP address and sends the IP address and a MAC address to the EWAG. For example, CPE 12 a may request to be assigned the IP address from GGSN 24 and send the IP address and the CPE's 12 a MAC address to EWAG 18. At 314, a GTP tunnel is established with the GGSN. For example, a GTP tunnel may be established between EWAG 18 and GGSN 24. Using the GTP tunnel, EWAG 18 may achieve Wi-Fi offload of 3G radio network without the need for a specific client software on CPE 12 a.
As identified previously, a network element (e.g., a gateway) can include software to achieve the access management operations, as outlined herein in this document. In certain example implementations, the access management functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor [processor 44 a shown in FIGS. 1A and 2A and processor 44 b shown in FIG. 2A], or other similar machine, etc.). In some of these instances, a memory element [memory 46 a shown in FIGS. 1A and 2A and memory 46 b shown in FIG. 2A] can store data used for the operations described herein. This includes the memory element being able to store software, logic, code, or processor instructions that are executed to carry out the activities described in this Specification. The processor (e.g., processor 44 a and 44 b) can execute any type of instructions associated with the data to achieve the operations detailed herein in this Specification. In one example, the processor could transform an element or an article (e.g., data) from one state or thing to another state or thing. In another example, the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by the processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array [FPGA], an erasable programmable read only memory (EPROM), an electrically erasable programmable ROM (EEPROM)) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof.
Any of these elements (e.g., the network elements, etc.) can include memory elements for storing information to be used in achieving the access activities as outlined herein. Additionally, each of these devices may include a processor that can execute software or an algorithm to perform the access management activities as discussed in this Specification. These devices may further keep information in any suitable memory element [random access memory (RAM), ROM, EPROM, EEPROM, ASIC, etc.], software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory items discussed herein should be construed as being encompassed within the broad term ‘memory element.’ Similarly, any of the potential processing elements, modules, and machines described in this Specification should be construed as being encompassed within the broad term ‘processor.’ Each of the network elements can also include suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment.
Note that with the examples provided above, interaction may be described in terms of two, three, or four network elements. However, this has been done for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of flows by only referencing a limited number of network elements. It should be appreciated that communication system 10 (and its teachings) are readily scalable and, further, can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of communication system 10, as potentially applied to a myriad of other architectures.
It is also important to note that the steps in the preceding FIGURES illustrate only some of the possible scenarios that may be executed by, or within, communication system 10. Some of these steps may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of the present disclosure. In addition, a number of these operations have been described as being executed concurrently with, or in parallel to, one or more additional operations. However, the timing of these operations may be altered considerably. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided by communication system 10 in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings of the present disclosure.
Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims. In order to assist the United States Patent and Trademark Office (USPTO) and, additionally, any readers of any patent issued on this application in interpreting the claims appended hereto, Applicant wishes to note that the Applicant: (a) does not intend any of the appended claims to invoke paragraph six (6) of 35 U.S.C. section 112 as it exists on the date of the filing hereof unless the words “means for” or “step for” are specifically used in the particular claims; and (b) does not intend, by any statement in the specification, to limit this disclosure in any way that is not otherwise reflected in the appended claims.

Claims (20)

What is claimed is:
1. A computer-implemented method, comprising:
receiving, at a wireless network element providing a dynamic host configuration protocol (DHCP) server, a DHCP discovery signal from a customer premise equipment;
receiving a proxy binding update from an access gateway, wherein the proxy binding update was sent in response to receiving the DHCP discovery signal from the customer premise equipment;
communicating a request from the wireless network element that a data session be established at the access gateway;
receiving, at the wireless network element, an Internet protocol (IP) address;
communicating the IP address from the wireless network element to the customer premise equipment;
receiving the IP address and a media access control (MAC) address from the customer premise equipment;
binding the IP address and the MAC address before communicating the IP address and the MAC address to the access gateway; and
communicating the bound IP address and MAC address to the access gateway.
2. The computer-implemented method of claim 1, wherein the access gateway is an anchor point gateway.
3. The computer-implemented method of claim 1, wherein the access gateway is a general packet radio service support node (GGSN) or a packet data network gateway (PDN-GW).
4. The computer-implemented method of claim 3, further comprising:
establishing a general packet radio service tunneling protocol (GTP) tunnel with the GGSN or the PDN-GW.
5. The computer-implemented method of claim 1, wherein mobility of the customer premise equipment is managed by a local mobility anchor.
6. The computer-implemented method of claim 1, wherein the request for establishing the data session is a packet data protocol context.
7. At least one non-transitory computer-readable medium comprising one or more instructions that when executed by at least one processor, cause the processor to:
receive, at a wireless network element providing a dynamic host configuration protocol (DHCP) server, a DHCP discovery signal from a customer premise equipment;
receive a proxy binding update from an access gateway, wherein the proxy binding update was sent in response to receiving the DHCP discovery signal from the customer premise equipment;
communicate a request from the wireless network element that a data session be established at the access gateway;
receive, at the wireless network element, an Internet protocol (IP) address;
communicate the IP address from the wireless network element to the customer premise equipment;
receive the IP address and a media access control (MAC) address from the customer premise equipment;
binding the IP address and the MAC address before communicating the IP address and the MAC address to the access gateway; and
communicate the bound IP address and MAC address to the access gateway.
8. The at least one non-transitory computer-readable medium of claim 7, wherein the access gateway is an anchor point gateway.
9. The at least one non-transitory computer-readable medium of claim 7, wherein the access gateway is a general packet radio service support node (GGSN) or a packet data network gateway (PDN-GW).
10. The at least one non-transitory computer-readable medium of claim 9, further comprising: establishing a GTP tunnel with the GGSN or the PDN-GW.
11. The at least one non-transitory computer-readable medium of claim 7, wherein mobility of the customer premise equipment is managed by a local mobility anchor.
12. The at least one non-transitory computer-readable medium of claim 7, wherein the request for establishing the data session is a packet data protocol context.
13. A wireless network element, comprising:
a memory element;
a processor operable to execute instructions associated with electronic code; and
an access module that interfaces with the processor such that the network element:
receives, at the wireless network element, which provides a dynamic host configuration protocol (DHCP) server, a DHCP discovery signal from a customer premise equipment;
receives a proxy binding update from an access gateway, wherein the proxy binding update was sent in response to receiving the DHCP discovery signal from the customer premise equipment;
communicates a request from the wireless network element that a data session be established at the access gateway;
receives, at the wireless network element, an Internet protocol (IP) address;
communicates the IP address from the wireless network element to the customer premise equipment;
receives the IP address and a media access control (MAC) address from the customer premise equipment;
binding the IP address and the MAC address before communicating the IP address and the MAC address to the access gateway; and
communicates the bound IP address and MAC address to the access gateway.
14. The wireless network element of claim 13, wherein the access module further interfaces with the processor such that the network element binds the IP address and the MAC address before communicating the IP address and the MAC address to the access gateway.
15. The wireless network element of claim 13, wherein the access gateway is a general packet radio service support node (GGSN) or a packet data network gateway (PDN-GW).
16. The computer-implemented method of claim 1, wherein the computer-implemented is for extended wireless access gateway service provider offload, wherein the access gateway comprises an anchor point gateway, wherein the access gateway is at least one of a general packet radio service support node (GGSN) and a packet data network gateway (PDN-GW).
17. The computer-implemented method of claim 16, wherein mobility of the customer premise equipment is managed by a local mobility anchor, wherein the request for establishing the data session is a packet data protocol context, wherein the access gateway is, in respective instances, the GGSN and the PDN-GW, wherein the computer-implemented method further comprises:
establishing a general packet radio service tunneling protocol (GTP) tunnel with the GGSN or the PDN-GW.
18. The computer-implemented method of claim 17, wherein the wireless network element includes Wi-Fi access gateway functions and tunnel termination gateway functions, wherein the wireless network element is configured to operate as a radius proxy for a plurality of customer premise equipment.
19. The computer-implemented method of claim 18, wherein the wireless network element and the gateway are on the same subnet, wherein the extended wireless access gateway service provider is configured to allow the customer premise equipment to have common service management on a wireless local area network and the GGSN.
20. The computer-implemented method of claim 19, wherein binding the IP address and the MAC address comprises:
binding the IP address and the MAC address with a general packet radio service tunneling protocol (GTP) identifier to establish a GTP tunnel with the GGSN or the PDN-GW;
wherein the computer-implemented method further comprises:
communicating the bound IP address and the MAC address to the GGSN or the PDN-GW.
US14/816,138 2011-11-28 2015-08-03 System and method for extended wireless access gateway service provider Wi-Fi offload Active 2032-06-22 US9973581B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/816,138 US9973581B2 (en) 2011-11-28 2015-08-03 System and method for extended wireless access gateway service provider Wi-Fi offload

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/305,010 US9100940B2 (en) 2011-11-28 2011-11-28 System and method for extended wireless access gateway service provider Wi-Fi offload
US14/816,138 US9973581B2 (en) 2011-11-28 2015-08-03 System and method for extended wireless access gateway service provider Wi-Fi offload

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/305,010 Continuation US9100940B2 (en) 2011-11-28 2011-11-28 System and method for extended wireless access gateway service provider Wi-Fi offload

Publications (2)

Publication Number Publication Date
US20160036922A1 US20160036922A1 (en) 2016-02-04
US9973581B2 true US9973581B2 (en) 2018-05-15

Family

ID=46147359

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/305,010 Active US9100940B2 (en) 2011-11-28 2011-11-28 System and method for extended wireless access gateway service provider Wi-Fi offload
US14/816,138 Active 2032-06-22 US9973581B2 (en) 2011-11-28 2015-08-03 System and method for extended wireless access gateway service provider Wi-Fi offload

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/305,010 Active US9100940B2 (en) 2011-11-28 2011-11-28 System and method for extended wireless access gateway service provider Wi-Fi offload

Country Status (3)

Country Link
US (2) US9100940B2 (en)
EP (1) EP2597925A1 (en)
CN (1) CN103152727B (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9100940B2 (en) 2011-11-28 2015-08-04 Cisco Technology, Inc. System and method for extended wireless access gateway service provider Wi-Fi offload
US8635128B2 (en) * 2012-03-06 2014-01-21 Edgecast Networks, Inc. Systems and methods for billing content providers for designated content delivered over a data network
US20130265985A1 (en) * 2012-04-10 2013-10-10 Motorola Mobility, Inc. Wireless communication device, communication system and method for establishing data connectivity between a wireless communicaiton device and a first access network
CN102638797B (en) * 2012-04-24 2016-08-03 华为技术有限公司 Access the method for wireless network, terminal, access network node and authentication server
CN103686671B (en) * 2012-09-14 2019-01-18 中兴通讯股份有限公司 A kind of method and system of notice access net location information
FR2996394A1 (en) * 2012-10-01 2014-04-04 France Telecom COMMUNICATION TECHNIQUE BETWEEN A CLIENT ENTITY AND A PACKET DATA NETWORK
CN104854893A (en) * 2012-11-27 2015-08-19 瑞典爱立信有限公司 System for handling access by wireless devices in wi-fi network
US9071959B2 (en) 2013-02-21 2015-06-30 International Business Machines Corporation Service awareness and seamless switchover between client based WiFi access and mobile data network access
US9113400B2 (en) * 2013-03-08 2015-08-18 Tellabs Operations, Inc Method and apparatus for offloading packet traffic from LTE network to WLAN using DPI
CN106105381B (en) * 2014-03-12 2019-09-24 英国电讯有限公司 Control method, wireless access gateway and the wireless network of wireless access gateway
EP3117686B1 (en) 2014-03-12 2017-12-20 British Telecommunications Public Limited Company Wireless access gateway
US9838214B2 (en) 2014-05-01 2017-12-05 Oracle International Corporation Wi-Fi offload of cellular data
US9629060B2 (en) 2014-06-06 2017-04-18 Oracle International Corporation Flexible routing policy for Wi-Fi offloaded cellular data
US10833892B2 (en) * 2015-03-05 2020-11-10 Blackberry Limited Bridged local area network communication between a device and a cellular access network node
WO2016184653A1 (en) * 2015-05-20 2016-11-24 British Telecommunications Public Limited Company Wireless access gateway
WO2017167695A1 (en) * 2016-03-31 2017-10-05 British Telecommunications Public Limited Company Roaming management
WO2018060540A1 (en) * 2016-09-28 2018-04-05 Nokia Technologies Oy Enhancing communication efficiency
GB2554671B (en) 2016-09-30 2019-02-20 British Telecomm WLAN Extender placement
US11153920B2 (en) 2017-12-15 2021-10-19 Hewlett Packard Enterprise Development Lp Establishing a GTP session
US11025541B2 (en) * 2017-12-15 2021-06-01 Hewlett Packard Enterprises Development LP Transporting a GTP message to a termination device
US11233856B2 (en) 2017-12-15 2022-01-25 Hewlett Packard Enterprise Development Lp Selecting an address of a device
WO2019179925A1 (en) 2018-03-22 2019-09-26 British Telecommunications Public Limited Company Wireless communication network authentication
US10834591B2 (en) * 2018-08-30 2020-11-10 At&T Intellectual Property I, L.P. System and method for policy-based extensible authentication protocol authentication
US10819676B1 (en) * 2019-05-22 2020-10-27 Verizon Patent And Licensing Inc. System and method of acquiring network-centric information for customer premises equipment (CPE) management
CN115314469B (en) * 2022-07-29 2023-10-03 广州通则康威智能科技有限公司 Service separation method and device for CPE

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020133573A1 (en) 1998-11-12 2002-09-19 Toru Matsuda Method and apparatus for automatic network configuration
US6542491B1 (en) 1998-09-16 2003-04-01 Mitsubishi Materials Corporation Wireless server, system and method
US20040242195A1 (en) 2003-02-11 2004-12-02 Lg Electronics Inc. Method for processing security message in mobile communication system
US20060036733A1 (en) 2004-07-09 2006-02-16 Toshiba America Research, Inc. Dynamic host configuration and network access authentication
US20080205345A1 (en) 2005-09-30 2008-08-28 Joachim Sachs Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
US20090040964A1 (en) 2007-08-06 2009-02-12 Fan Zhao Dynamic internet protocol addressing solutions with network-based mobility
US7536464B1 (en) 2003-09-25 2009-05-19 Cisco Technology, Inc. Methods and apparatus for performing layer 2 authentication and service selection in SSG based networks
US20090131053A1 (en) 2005-04-29 2009-05-21 Telefonaktiebolaget Lm Ericsson (Publ) Internetworking of Cellular Radio Networks and Wireless Data Networks
US20090285179A1 (en) 2008-05-16 2009-11-19 Bridgewater Systems Corp. Long-Term Evolution (LTE) Packet Data Network Gateway (PDN-GW) Selection
US20100191839A1 (en) 2009-01-28 2010-07-29 Juniper Networks, Inc. Synchronizing resource bindings within computer network
US20100199332A1 (en) 2007-06-19 2010-08-05 Panasonic Corporation Access-Network to Core-Network Trust Relationship Detection for a Mobile Node
US20110211574A1 (en) 2008-11-07 2011-09-01 Huawei Technologies Co., Ltd. Method, system and apparatus for session association
US20110255471A1 (en) 2008-12-19 2011-10-20 Hans-Olof Sundell Assist Reordering Of Downlink Data At Serving GW Relocation
US20120079271A1 (en) 2010-09-24 2012-03-29 Carlos Cordeiro Method and apparatus for wireless device authentication and association
US20120201222A1 (en) 2009-10-06 2012-08-09 Nortel Networks Limited System and protocols for inter-mobility access gateway tunneling for fast handoff transition
EP2597925A1 (en) 2011-11-28 2013-05-29 Cisco Technology, Inc. System and method for extended wireless access gateway service provider WI-FI offload
US20140026206A1 (en) 2012-07-20 2014-01-23 Cisco Technology, Inc. System and method for supporting web authentication
US20140153489A1 (en) * 2011-06-02 2014-06-05 Interdigital Patent Holdings, Inc. Methods, Apparatus and Systems for Inter-Converged Gateway (ICGW) Communications
US20160062073A1 (en) * 2014-08-28 2016-03-03 Himax Technologies Limited Image sensor module and method for adjusting focus of image sensor module

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6608832B2 (en) * 1997-09-25 2003-08-19 Telefonaktiebolaget Lm Ericsson Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services
US9372279B2 (en) * 2001-05-08 2016-06-21 Shuji Mori Method of determining petroleum location
US20090168754A1 (en) * 2007-12-28 2009-07-02 Chang Hong Shan Systems and methods for WiMAX and 3GPP interworking by using GGSN

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6542491B1 (en) 1998-09-16 2003-04-01 Mitsubishi Materials Corporation Wireless server, system and method
US7039688B2 (en) 1998-11-12 2006-05-02 Ricoh Co., Ltd. Method and apparatus for automatic network configuration
US20060155833A1 (en) 1998-11-12 2006-07-13 Toru Matsuda Method and apparatus for automatic network configuration
US20020133573A1 (en) 1998-11-12 2002-09-19 Toru Matsuda Method and apparatus for automatic network configuration
US7577723B2 (en) 1998-11-12 2009-08-18 Ricoh Co., Ltd. Method and apparatus for automatic network configuration
US20040242195A1 (en) 2003-02-11 2004-12-02 Lg Electronics Inc. Method for processing security message in mobile communication system
US7536464B1 (en) 2003-09-25 2009-05-19 Cisco Technology, Inc. Methods and apparatus for performing layer 2 authentication and service selection in SSG based networks
US20060036733A1 (en) 2004-07-09 2006-02-16 Toshiba America Research, Inc. Dynamic host configuration and network access authentication
US20090131053A1 (en) 2005-04-29 2009-05-21 Telefonaktiebolaget Lm Ericsson (Publ) Internetworking of Cellular Radio Networks and Wireless Data Networks
US8023469B2 (en) 2005-04-29 2011-09-20 Telefonaktiebolaget L M Ericsson (Publ) Internetworking of cellular radio networks and wireless data networks
US8019346B2 (en) 2005-09-30 2011-09-13 Telefonaktiebolaget L M Ericsson (Publ) Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
US20080205345A1 (en) 2005-09-30 2008-08-28 Joachim Sachs Means and Methods for Improving the Handover Characteristics of Integrated Radio Access Networks
US20100199332A1 (en) 2007-06-19 2010-08-05 Panasonic Corporation Access-Network to Core-Network Trust Relationship Detection for a Mobile Node
US20090040964A1 (en) 2007-08-06 2009-02-12 Fan Zhao Dynamic internet protocol addressing solutions with network-based mobility
US20090285179A1 (en) 2008-05-16 2009-11-19 Bridgewater Systems Corp. Long-Term Evolution (LTE) Packet Data Network Gateway (PDN-GW) Selection
US20110211574A1 (en) 2008-11-07 2011-09-01 Huawei Technologies Co., Ltd. Method, system and apparatus for session association
US20110255471A1 (en) 2008-12-19 2011-10-20 Hans-Olof Sundell Assist Reordering Of Downlink Data At Serving GW Relocation
US20100191839A1 (en) 2009-01-28 2010-07-29 Juniper Networks, Inc. Synchronizing resource bindings within computer network
US8285875B2 (en) 2009-01-28 2012-10-09 Juniper Networks, Inc. Synchronizing resource bindings within computer network
US20120201222A1 (en) 2009-10-06 2012-08-09 Nortel Networks Limited System and protocols for inter-mobility access gateway tunneling for fast handoff transition
US20120079271A1 (en) 2010-09-24 2012-03-29 Carlos Cordeiro Method and apparatus for wireless device authentication and association
US20140153489A1 (en) * 2011-06-02 2014-06-05 Interdigital Patent Holdings, Inc. Methods, Apparatus and Systems for Inter-Converged Gateway (ICGW) Communications
EP2597925A1 (en) 2011-11-28 2013-05-29 Cisco Technology, Inc. System and method for extended wireless access gateway service provider WI-FI offload
US20130138823A1 (en) 2011-11-28 2013-05-30 Cisco Technology, Inc. System and method for extended wireless access gateway service provider wi-fi offload
US9100940B2 (en) 2011-11-28 2015-08-04 Cisco Technology, Inc. System and method for extended wireless access gateway service provider Wi-Fi offload
US20140026206A1 (en) 2012-07-20 2014-01-23 Cisco Technology, Inc. System and method for supporting web authentication
US8990916B2 (en) 2012-07-20 2015-03-24 Cisco Technology, Inc. System and method for supporting web authentication
US20160062073A1 (en) * 2014-08-28 2016-03-03 Himax Technologies Limited Image sensor module and method for adjusting focus of image sensor module

Non-Patent Citations (17)

* Cited by examiner, † Cited by third party
Title
"Presentation of SaMOG", 3GPP Draft 3BF-11039_WAS JBF-11004-SAMOG, Nov. 3, 2011 (Nov. 3, 2011).
3 GPP TR 23.852 V0.4.0 (Oct. 2011) 3 GPP Organizational Partners, "3rd Generation Partnership Project: Technical Specification Group Services and System Aspects; Study on S2a Mobility Based on GTP & WLAN Access to EPC (SaMOG); Stage 2 (Release 11)," Oct. 2011, 38 pages.
3 GPP TS 23.402 V11.0.0 (Sep. 2011) 3 GPP Organizational Partners, "3rd Generation Partnership Project: Technical Specification Group Services and System Aspects; Architecture Enhancements for non-3GPP Accesses (Release 11)," 3GPP, Sep. 2011, 232 pages.
3GPP TS 23.402 V 10.1.0 Technical Specification: "3rd Generation Partnership Project: Group Services and System Aspects:; Architecture Enhancements for non-3GPP Accesses (Release 10)," 3rd Generation Partnership Project, Sep. 2010.
Alcatel-Lucent: "Solution for Trusted WLAN w/o UE impact", 3GPP Draft S2-111627, Apr. 6, 2011 (Apr. 6, 2011).
Droms, R., "Dynamic Host Configuration Protocol," RFC1541, Mar. 1997, 45 pages.
EPO Jul. 23, 2014 Communication and Office Action from European Application No. 12169631.4.
EPO Nov. 22, 2012 European Search Report and Written Opinion from EP Application No. 12169631.4.
ETSI-TS-123-402-V10-5-0, "Universal Mobile Telecommunications System (UMTS); LTE; Architecture enhancements for non-3GPP accesses (3GPP TS 23.402 version 10.5.0 Release 10)", Oct. 1. 2011 (Oct. 1. 2011); 233pgs.
Intel et al: "Solution for Trusted WLAN access to EPC", 3GPP Draft S2-113148V2, Jul. 5, 2011 (Jul. 5, 2011).
PRC Feb. 2, 2015 SIPO First Office Action from Chinese Application Serial No. 201210491799.X.
PRC Sep. 28, 2015 SIPO Second Office Action from Chinese Application Serial No. 201210491799.X.
Taaghol P et al: "Seamless integration of mobile WiMAX in 3GPP networks", Oct. 2008 (Oct. 1, 2008), pp. 74-85.
USPTO Jan. 27, 2014 Non-Final Office Action from U.S. Appl. No. 13/554,873.
USPTO May 21, 2014 Final Office Action from U.S. Appl. No. 13/554,873.
USPTO Nov. 7, 2014 Notice of Allowance from U.S. Appl. No. 13/554,873.
USPTO Oct. 25, 2013 Non-Final Office Action from U.S. Appl. No. 13/554,873.

Also Published As

Publication number Publication date
US9100940B2 (en) 2015-08-04
CN103152727A (en) 2013-06-12
CN103152727B (en) 2016-06-29
EP2597925A1 (en) 2013-05-29
US20160036922A1 (en) 2016-02-04
US20130138823A1 (en) 2013-05-30

Similar Documents

Publication Publication Date Title
US9973581B2 (en) System and method for extended wireless access gateway service provider Wi-Fi offload
EP2993868B1 (en) System and method for internet protocol version-based multiple access point name support in a network environment
EP2586236B1 (en) Method and apparatus for communicating via a gateway
CN104255046B (en) The method of customized mobile broadband network system and customization mobile broadband network
US8942112B2 (en) System and method for providing selective mobility invocation in a network environment
US9635686B2 (en) System and method for providing internet protocol flow mobility in a network environment
JP4927939B2 (en) Automatic home agent selection
CN107682900B (en) Data flow control method and related equipment and communication system
US9853937B1 (en) Internal packet steering within a wireless access gateway
US11284462B2 (en) Techniques for providing a third generation partnership project (3GPP) fabric anchor for an enterprise fabric
EP2244424A1 (en) A method for selecting a policy and charging rules function server on a non-roaming scene
US9622143B1 (en) Access point name mappings for a layer two wireless access network
CN102857987A (en) User session routing between mobile network gateways
US8195778B1 (en) System and method for providing mobility across access technologies in a network environment
US20220368563A1 (en) Method for implementing gre tunnel, access point and gateway
CN102917356A (en) System, equipment and method for enabling user equipment to access to evolved packet core network
EP3258724B1 (en) Preserving mobile network session data during radio access technology handover
US8990916B2 (en) System and method for supporting web authentication
JP2010522483A (en) Selection of IP mobility mechanism for multi-mode terminal with direct IP connectivity
JP6403824B2 (en) Customizable mobile broadband network system and method for customizing mobile broadband network
Yeo et al. A mobile SIP: IP mobility support using SIP

Legal Events

Date Code Title Description
AS Assignment

Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CENTEMERI, MARCO C.;LOPEZ, LUIS;OSWAL, ANAND;AND OTHERS;SIGNING DATES FROM 20111121 TO 20111122;REEL/FRAME:044875/0616

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4